Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Deep Shankar Yadav

Principal Consultant at eSec Forte Technologies Pvt Ltd

New Delhi, India

I am a creative and results-driven Information Security and DFIR Professional with eight years of comprehensive consulting and corporate experience in various verticals of domains.

Available For: Advising, Authoring, Consulting, Influencing, Speaking
Travels From: Delhi
Speaking Topics: Digital Forensics, Incident Response, Cyber Security, Digital Forensics, Cloud Native Security, Container Security, DevSecOps, Security Management and

Deep Shankar Yadav Points
Academic 0
Author 4
Influencer 9
Speaker 6
Entrepreneur 3
Total 22

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Business Unit: Information Security and Risk Management
Theatre: Gloabal
Minimum Project Size: Undisclosed
Average Hourly Rate: Undisclosed
Number of Employees: Undisclosed
Company Founded Date: Undisclosed
Media Experience: 8 Years
Last Media Interview: 08/01/2020

Areas of Expertise

Business Continuity
Business Strategy
Cloud
Cybersecurity 30.73
Data Center
Digital Transformation
Emerging Technology
Future of Work
Innovation
IoT
Leadership 30.05
Management
Mergers and Acquisitions
Privacy
Risk Management 31.54
Entrepreneurship 30.33
DevOps 31.98

Industry Experience

Financial Services & Banking
Higher Education & Research
Industrial Machinery & Components
Professional Services
Telecommunications
Travel & Transportation

Publications

4 Article/Blogs
Cyber Security and DFIR Interview Questions
https://www.deepshankaryadav.net/cyber-security-and-dfir-interview-questions/
August 01, 2020

See publication

Tags: Cybersecurity, Entrepreneurship, Risk Management

Low-Cost Honeypots as Enterprise Defence Mechanism
https://eforensicsmag.com/download/reverse-engineering-guide/
September 01, 2017
Since the launch of Fred Cohens’ Deception Toolkit in 1998 (first publicly released Honeypot), Honeypots have been a proven useful method for attack detection and analysis. As these honeypots are complex in installation and require high maintenance, they are yet to get their proper place in enterprise security suites. However, the honeypot technology has been seeing rapid growth, and soon it will be held among various businesses’ threat detect security tools.

See publication

Tags: Cybersecurity, Risk Management

Digital Forensics and Incident Response using Docker
https://www.digital4n6journal.com/
November 01, 2016
Docker has changed the way applications have been transported especially across multiple Linux distros. It creates a container that carries all the application specific dependencies along with application which then can be used on any other distros. As a forensics investigator, one has to continuously keep installing various applications on various systems and have to struggle with all the hassled associated with such installations and resulting dependency conflicts. Docker is one of the best available solutions to handle all this.

See publication

Tags: Cybersecurity, Risk Management

Honeypot Aided Cyber Crime and Network Forensics Investigation
https://www.digital4n6journal.com/
October 01, 2016
Using honeypots provides a cost-effective solution to increase the security of an organization. Monitoring malicious traffic is useful for network forensics and intrusion detection systems. Data received by traditional network tools can be correlated with honeypots captures to obtain more valuable evidence and clues.

See publication

Tags: Cybersecurity, Risk Management

1 Influencer Award
InfoSec Star of The Year
https://www.ncdrc.res.in
September 01, 2016

See publication

Tags: Cybersecurity

1 Membership
OWASP Membership
https://www.owasp.org
April 01, 2020

See publication

Tags: Cybersecurity, Entrepreneurship, Risk Management

1 Speaking Engagement
RANSOMWARE-Increasing Intolerance
NCDRC
March 15, 2017

See publication

Tags: Cybersecurity, Leadership, Risk Management

1 Webinar
DEVSECOPS AND CONTAINER 101 FOR SECURITY TEAMS
cyberfrat.com
August 01, 2020

See publication

Tags: Cybersecurity, Risk Management, DevOps

Thinkers360 Credentials

2 Badges

Blog

Opportunities

Contact Deep Shankar Yadav

Book Deep Shankar Yadav for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Deep Shankar Yadav